WO2010091430A1 - Managing access control to closed subscriber groups - Google Patents
Managing access control to closed subscriber groups Download PDFInfo
- Publication number
- WO2010091430A1 WO2010091430A1 PCT/US2010/023677 US2010023677W WO2010091430A1 WO 2010091430 A1 WO2010091430 A1 WO 2010091430A1 US 2010023677 W US2010023677 W US 2010023677W WO 2010091430 A1 WO2010091430 A1 WO 2010091430A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- csg
- operator
- list
- forbidden
- ids
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/24—Cell structures
- H04W16/32—Hierarchical cell structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
Definitions
- the following description relates generally to wireless communications, and more particularly to managing access control to Closed Subscriber Group (CSG) cells in a wireless communication environment.
- CSG Closed Subscriber Group
- Wireless communication systems are widely deployed to provide various types of communication content such as, for example, voice, data, and so on.
- Typical wireless communication systems can be multiple-access systems capable of supporting communication with multiple users by sharing available system resources (e.g., bandwidth, transmit power, ).
- multiple-access systems can include code division multiple access (CDMA) systems, time division multiple access (TDMA) systems, frequency division multiple access (FDMA) systems, orthogonal frequency division multiple access (OFDMA) systems, and the like.
- CDMA code division multiple access
- TDMA time division multiple access
- FDMA frequency division multiple access
- OFDMA orthogonal frequency division multiple access
- the systems can conform to specifications such as third generation partnership project (3 GPP), 3GPP long term evolution (LTE), ultra mobile broadband (UMB), and/or multi-carrier wireless specifications such as evolution data optimized (EV-DO), one or more revisions thereof, etc.
- 3 GPP third generation partnership project
- LTE 3GPP long term evolution
- UMB ultra mobile broadband
- wireless multiple-access communication systems can simultaneously support communication for multiple user equipments (UEs).
- UEs user equipments
- Each UE can communicate with one or more base stations via transmissions on forward and reverse links.
- the forward link refers to the communication link from base stations to UEs
- the reverse link refers to the communication link from UEs to base stations.
- communications between UEs and base stations can be established via single-input single-output (SISO) systems, multiple-input single-output (MISO) systems, multiple-input multiple-output (MIMO) systems, and so forth.
- SISO single-input single-output
- MISO multiple-input single-output
- MIMO multiple-input multiple-output
- UEs can communicate with other UEs (and/or base stations with other base stations) in peer-to-peer wireless network configurations.
- Heterogeneous wireless communication systems commonly can include various types of base stations, each of which can be associated with differing cell sizes.
- macro cell base stations typically leverage antenna(s) installed on masts, rooftops, other existing structures, or the like. Further, macro cell base stations oftentimes have power outputs on the order of tens of watts, and can provide coverage for large areas.
- the femto cell base station is another class of base station that has recently emerged.
- Femto cell base stations are commonly designed for residential or small business environments, and can provide wireless coverage to UEs using a wireless technology (e.g., 3GPP Universal Mobile Telecommunications System (UMTS) or Long Term Evolution (LTE), Ix Evolution-Data Optimized (IxEV-DO), ...) to communicate with the UEs and an existing broadband Internet connection (e.g., digital subscriber line (DSL), cable, ...) for backhaul.
- a femto cell base station can also be referred to as a Home Evolved Node B (HeNB), a Home Node B (HNB), a femto cell, or the like. Examples of other types of base stations include pico cell base stations, micro cell base stations, and so forth.
- some femto cell base stations or other base stations in a network can be restricted for access in some manner.
- different base stations in the network can belong to different Closed Subscriber Groups (CSGs).
- CSGs Closed Subscriber Groups
- access control issues can arise due to a lack of synchronization between a UE and a network.
- a UE can use some form of list (e.g., whitelist, ...) to identify base stations that the UE is allowed to access.
- the list retained by the UE can be read only and operator controlled.
- the network can have an equivalent list. A problem can arise if the UE is removed from a CSG.
- the UE can receive a reject message indicating that the UE lacks authorization for this CSG.
- the list stored by the UE is read only, the UE can be unauthorized to change entries in the list stored by the UE, and thus, unable to remove the CSG from such stored list.
- the UE can again attempt to access the CSG cell from the CSG, and again receive a reject message indicating that the UE lacks authorization for this CSG.
- a user equipment can store an operator CSG list, which can be read only and controlled by an operator. Further, the operator CSG list can lack synchronization to a CSG subscription for the UE retained in the network.
- a reject message that indicates that the UE lacks authorization for the CSG can be received.
- the CSG ID can be stored as a forbidden CSG ID of the UE in a set of forbidden CSG IDs in response to receipt of the reject message when the CSG ID is included in the operator CSG list.
- a method is described herein. The method can include selecting to access a Closed Subscriber Group (CSG) cell associated with a CSG with a corresponding CSG Identifier (ID) included in an operator CSG list of a user equipment (UE), the operator CSG list being read only and controlled by an operator. Further, the method can include receiving a reject message that indicates the UE lacks authorization for the CSG.
- CSG Closed Subscriber Group
- ID CSG Identifier
- the method can include storing the CSG ID as a forbidden CSG ID of the UE in a set of forbidden CSG IDs in response to receipt of the reject message when the CSG ID is included in the operator CSG list.
- the wireless communications apparatus can include at least one processor.
- the at least one processor can be configured to select to access a Closed Subscriber Group (CSG) cell associated with a CSG with a corresponding CSG Identifier (ID) included in an operator CSG list of a user equipment (UE), the operator CSG list being read only and controlled by an operator.
- the at least one processor can be configured to receive a reject message that indicates the UE lacks authorization for the CSG.
- the at least one processor can be configured to retain the CSG ID as a forbidden CSG ID of the UE in a set of forbidden CSG IDs in response to receipt of the reject message when the CSG ID is included in the operator CSG list.
- the apparatus can include means for selecting to access a Closed Subscriber Group (CSG) cell associated with a CSG with a corresponding CSG Identifier (ID) included in an operator CSG list of a user equipment (UE), the operator CSG list being read only and controlled by an operator.
- CSG Closed Subscriber Group
- ID CSG Identifier
- the apparatus can include means for storing the CSG ID as a forbidden CSG ID in response to receipt of a reject message that indicates that the UE lacks authorization for the CSG when the CSG ID is included in the operator CSG list.
- Still another aspect relates to a computer program product that can comprise a computer-readable medium.
- the computer-readable medium can include code for causing at least one computer to select to access a Closed Subscriber Group (CSG) cell associated with a CSG with a corresponding CSG Identifier (ID) included in an operator CSG list of a user equipment (UE), the operator CSG list being read only and controlled by an operator.
- the computer-readable medium can include code for causing at least one computer to store the CSG ID as a forbidden CSG ID in response to receipt of a reject message that indicates that the UE lacks authorization for the CSG when the CSG ID is included in the operator CSG list.
- Yet another aspect relates to an apparatus that can include a selection component that selects to access a Closed Subscriber Group (CSG) cell associated with a CSG with a corresponding CSG Identifier (ID) included in an operator CSG list of a user equipment (UE), the operator CSG list being read only and controlled by an operator.
- the apparatus can include a forbidden CSG management component that stores the CSG ID as a forbidden CSG ID in a set of forbidden CSG IDs in response to receipt of a reject message that indicates that the UE lacks authorization for the CSG when the CSG ID is included in the operator CSG list.
- a method is described herein.
- the method can include receiving a message indicating that a user equipment (UE) is not authorized for a Closed Subscriber Group (CSG).
- the method can include recognizing whether a CSG Identifier (ID) corresponding to the CSG is present in an operator CSG list, the operator CSG list being read only and controlled by an operator.
- the method can also include inhibiting inclusion of the CSG ID in a list of allowed CSG IDs provided to an Access Stratum (AS) for cell selection when the CSG ID is present in the operator CSG list.
- AS Access Stratum
- the wireless communications apparatus can include at least one processor.
- the at least one processor can be configured to receive a message indicating that a user equipment (UE) is not authorized for a Closed Subscriber Group (CSG).
- the at least one processor can be further configured to recognize whether a CSG Identifier (ID) corresponding to the CSG is present in an operator CSG list, the operator CSG list being read only and controlled by an operator.
- the at least one processor can be configured to inhibit inclusion of the CSG ID in a list of allowed CSG IDs provided to an Access Stratum (AS) for cell selection when the CSG ID is present in the operator CSG list.
- AS Access Stratum
- Yet another aspect relates to an apparatus.
- the apparatus can include means for receiving a message indicating that a user equipment (UE) is not authorized for a Closed Subscriber Group (CSG). Further, the apparatus can include means for inhibiting inclusion of a CSG Identifier (ID) corresponding to the CSG in a list of allowed CSG IDs provided to an Access Stratum (AS) for cell selection when the CSG ID is present in an operator CSG list, the operator CSG list being read only and controlled by an operator.
- ID CSG Identifier
- AS Access Stratum
- Still another aspect relates to a computer program product that can comprise a computer-readable medium.
- the computer-readable medium can include code for causing at least one computer to receive a message indicating that a user equipment (UE) is not authorized for a Closed Subscriber Group (CSG).
- the computer- readable medium can include code for causing at least one computer to inhibit inclusion of a CSG Identifier (ID) corresponding to the CSG in a list of allowed CSG IDs provided to an Access Stratum (AS) for cell selection when the CSG ID is present in an operator CSG list, the operator CSG list being read only and controlled by an operator.
- ID CSG Identifier
- AS Access Stratum
- Yet another aspect relates to an apparatus that can include a forbidden CSG management component that receives a message indicating that a user equipment (UE) is not authorized for a Closed Subscriber Group (CSG). Further, the apparatus can include a filter component that inhibits inclusion of a CSG Identifier (ID) corresponding to the CSG in a list of allowed CSG IDs provided to an Access Stratum (AS) for cell selection when the CSG ID is present in an operator CSG list, the operator CSG list being read only and controlled by an operator.
- a forbidden CSG management component that receives a message indicating that a user equipment (UE) is not authorized for a Closed Subscriber Group (CSG).
- the apparatus can include a filter component that inhibits inclusion of a CSG Identifier (ID) corresponding to the CSG in a list of allowed CSG IDs provided to an Access Stratum (AS) for cell selection when the CSG ID is present in an operator CSG list, the operator CSG list being read only and controlled by an operator.
- a method is described herein.
- the method can include receiving a message indicating that a user equipment (UE) is not authorized for a Closed Subscriber Group (CSG). Further, the method can include recognizing whether a CSG Identifier (ID) corresponding to the CSG is present in an operator CSG list, the operator CSG list being read only and controlled by an operator. Moreover, the method can include inhibiting the UE from indicating that the CSG ID is in the operator CSG list stored in the UE for manual CSG selection mode.
- CSG Closed Subscriber Group
- the wireless communications apparatus can include at least one processor.
- the at least one processor can be configured to receive a message indicating that a user equipment (UE) is not authorized for a Closed Subscriber Group (CSG).
- the at least one processor can be configured to recognize whether a CSG Identifier (ID) corresponding to the CSG is present in an operator CSG list, the operator CSG list being read only and controlled by an operator.
- the at least one processor can be configured to inhibit the UE from indicating that the CSG ID is in the operator CSG list stored in the UE for manual CSG selection mode.
- the apparatus can include means for receiving a message indicating that a user equipment (UE) is not authorized for a Closed Subscriber Group (CSG).
- the apparatus can further include means for inhibiting the UE from indicating that a CSG Identifier (ID) corresponding to the CSG is in an operator CSG list stored in the UE for manual CSG selection mode, the operator CSG list being read only and controlled by an operator.
- UE user equipment
- CSG Closed Subscriber Group
- Still another aspect relates to a computer program product that can comprise a computer-readable medium.
- the computer-readable medium can include code for causing at least one computer to receive a message indicating that a user equipment (UE) is not authorized for a Closed Subscriber Group (CSG).
- the computer- readable medium can include code for causing at least one computer to inhibit the UE from indicating that a CSG Identifier (ID) corresponding to the CSG is in an operator CSG list stored in the UE for manual CSG selection mode, the operator CSG list being read only and controlled by an operator.
- ID CSG Identifier
- Yet another aspect relates to an apparatus that can include a display component that renders a list of Closed Subscriber Group (CSG) Identifiers (IDs) included in an operator CSG list stored in a user equipment (UE) for manual CSG selection, the operator CSG list being read only and controlled by an operator.
- the apparatus can include a forbidden CSG management component that receives a message indicating that the UE is not authorized for a CSG.
- the apparatus can include a filter component that inhibits the display component from indicating that a CSG ID corresponding to the CSG is in the operator CSG list stored in the UE for manual CSG selection.
- the one or more aspects comprise the features hereinafter fully described and particularly pointed out in the claims.
- the following description and the annexed drawings set forth in detail certain illustrative features of the one or more aspects. These features are indicative, however, of but a few of the various ways in which the principles of various aspects may be employed, and this description is intended to include all such aspects and their equivalents.
- FIG. 1 is an illustration of a wireless communication system in accordance with various aspects set forth herein.
- FIG. 2 is an illustration of an example system that supports recovering from lack of synchronization between a network and a UE in a wireless communication environment.
- FIG. 3 is an illustration of an example system that identifies CSG cells available for access in a wireless communication environment.
- FIG. 4 is an illustration of an example system that performs CSG selection in a wireless communication environment.
- FIG. 5 is an illustration of an example system that provisions an operator CSG list of a UE in a wireless communication environment.
- FIG. 6 is an illustration of an example system that enables deployment of access point base stations (e.g., femto cell base stations, ...) within a network environment.
- access point base stations e.g., femto cell base stations,
- FIG. 7 is an illustration of an example system that provides Closed Subscriber
- CSG CSG support in a wireless communication environment.
- FIG. 8 is an illustration of an example methodology that facilitates recovering from lack of synchronization in a wireless communication environment.
- FIG. 9 is an illustration of an example methodology that facilitates identifying suitable cells for access in a wireless communication environment.
- FIG. 10 is an illustration of an example methodology that facilitates displaying entries in an operator CSG list for manual CSG selection mode in a wireless communication environment.
- FIG. 11 is an illustration of an example UE that manages access control to CSGs in a wireless communication system.
- FIG. 12 is an illustration of an example system that supports access in a wireless communication environment.
- FIG. 13 is an illustration of an example wireless network environment that can be employed in conjunction with the various systems and methods described herein.
- FIG. 14 is an illustration of an example system that enables managing access control in a wireless communication environment.
- FIG. 15 is an illustration of an example system that enables detecting CSG cells suitable for access in a wireless communication environment.
- FIG. 16 is an illustration of an example system that enables displaying CSG IDs in connection with manual CSG selection mode in a wireless communication environment.
- a component can be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
- both an application running on a computing device and the computing device can be a component.
- One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers.
- these components can execute from various computer readable media having various data structures stored thereon.
- the components can communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets, such as data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems by way of the signal.
- a terminal can be a wired terminal or a wireless terminal.
- a terminal can also be called a system, device, subscriber unit, subscriber station, mobile station, mobile, mobile device, remote station, remote terminal, access terminal, user terminal, terminal, communication device, user agent, user device, or user equipment (UE).
- a wireless terminal can be a cellular telephone, a satellite phone, a cordless telephone, a Session Initiation Protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a handheld device having wireless connection capability, a computing device, or other processing devices connected to a wireless modem.
- SIP Session Initiation Protocol
- WLL wireless local loop
- PDA personal digital assistant
- a base station can be utilized for communicating with wireless terminal(s) and can also be referred to as an access point, a Node B, an Evolved Node B (eNode B, eNB), a femto cell, a pico cell, a micro cell, a macro cell, a Home Evolved Node B (HeNB), a Home Node B (HNB), or some other terminology.
- eNode B Evolved Node B
- HeNB Home Evolved Node B
- HNB Home Node B
- the term "or” is intended to mean an inclusive “or” rather than an exclusive “or.” That is, unless specified otherwise, or clear from the context, the phrase “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, the phrase “X employs A or B” is satisfied by any of the following instances: X employs A; X employs B; or X employs both A and B.
- the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more” unless specified otherwise or clear from the context to be directed to a singular form.
- CDMA code division multiple access
- TDMA time division multiple access
- FDMA frequency division multiple access
- OFDMA orthogonal frequency division multiple access
- SC- FDMA single carrier-frequency division multiple access
- GSM Global System for Mobile Communications
- An OFDMA system can implement a radio technology such as Evolved UTRA (E-UTRA), Ultra Mobile Broadband (UMB), IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, Flash- OFDM, etc.
- E-UTRA Evolved UTRA
- UMB Ultra Mobile Broadband
- IEEE 802.11 Wi-Fi
- WiMAX IEEE 802.16
- Flash- OFDM Flash- OFDM
- UTRA and E-UTRA are part of Universal Mobile Telecommunication System (UMTS).
- UMTS Universal Mobile Telecommunication System
- 3GPP Long Term Evolution (LTE) is a release of UMTS that uses E- UTRA, which employs OFDMA on the downlink and SC-FDMA on the uplink.
- UTRA, E-UTRA, UMTS, LTE and GSM are described in documents from an organization named "3rd Generation Partnership Project" (3GPP).
- CDMA2000 and Ultra Mobile Broadband (UMB) are described in documents from an organization named "3rd Generation Partnership Project 2" (3GPP2).
- 3GPP2 3rd Generation Partnership Project 2
- such wireless communication systems can additionally include peer-to-peer (e.g., mobile-to- mobile) ad hoc network systems often using unpaired unlicensed spectrums, 802. xx wireless LAN, BLUETOOTH and any other short- or long- range, wireless communication techniques.
- SC-FDMA Single carrier frequency division multiple access
- SC-FDMA utilizes single carrier modulation and frequency domain equalization.
- SC-FDMA has similar performance and essentially the same overall complexity as those of an OFDMA system.
- a SC-FDMA signal has lower peak-to-average power ratio (PAPR) because of its inherent single carrier structure.
- PAPR peak-to-average power ratio
- SC-FDMA can be used, for instance, in uplink communications where lower PAPR greatly benefits access terminals in terms of transmit power efficiency.
- SC-FDMA can be implemented as an uplink multiple access scheme in 3GPP Long Term Evolution (LTE) or Evolved UTRA.
- LTE Long Term Evolution
- Evolved UTRA Evolved UTRA
- computer-readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips, etc.), optical disks (e.g., compact disk (CD), digital versatile disk (DVD), etc.), smart cards, and flash memory devices (e.g., EPROM, card, stick, key drive, etc.).
- various storage media described herein can represent one or more devices and/or other machine-readable media for storing information.
- machine-readable medium can include, without being limited to, wireless channels and various other media capable of storing, containing, and/or carrying instruction(s) and/or data.
- System 100 comprises a base station 102 that can include multiple antenna groups.
- one antenna group can include antennas 104 and 106, another group can comprise antennas 108 and 110, and an additional group can include antennas 112 and 114.
- Two antennas are illustrated for each antenna group; however, more or fewer antennas can be utilized for each group.
- Base station 102 can additionally include a transmitter chain and a receiver chain, each of which can in turn comprise a plurality of components associated with signal transmission and reception (e.g., processors, modulators, multiplexers, demodulators, demultiplexers, antennas, etc.), as will be appreciated by one skilled in the art.
- Base station 102 can communicate with one or more user equipments (UEs) such as UE 116 and UE 122; however, it is to be appreciated that base station 102 can communicate with substantially any number of UEs similar to UEs 116 and 122.
- UEs 116 and 122 can be, for example, cellular phones, smart phones, laptops, handheld communication devices, handheld computing devices, satellite radios, global positioning systems, PDAs, and/or any other suitable device for communicating over wireless communication system 100.
- UE 116 is in communication with antennas 112 and 114, where antennas 112 and 114 transmit information to UE 116 over a forward link 118 and receive information from UE 116 over a reverse link 120.
- UE 122 is in communication with antennas 104 and 106, where antennas 104 and 106 transmit information to UE 122 over a forward link 124 and receive information from UE 122 over a reverse link 126.
- forward link 118 can utilize a different frequency band than that used by reverse link 120
- forward link 124 can employ a different frequency band than that employed by reverse link 126, for example.
- forward link 118 and reverse link 120 can utilize a common frequency band and forward link 124 and reverse link 126 can utilize a common frequency band.
- Each group of antennas and/or the area in which they are designated to communicate can be referred to as a sector of base station 102.
- antenna groups can be designed to communicate to UEs in a sector of the areas covered by base station 102.
- the transmitting antennas of base station 102 can utilize beamforming to improve signal-to-noise ratio of forward links 118 and 124 for UEs 116 and 122.
- base station 102 utilizes beamforming to transmit to UEs 116 and 122 scattered randomly through an associated coverage
- UEs in neighboring cells can be subject to less interference as compared to a base station transmitting through a single antenna to all its UEs.
- base station 102 can be any type of base station (e.g., macro cell base station, micro cell base station, pico cell base station, femto cell base station, ). Further, base station 102 can operate in closed access mode, for example. When employing closed access mode, base station 102 can operate as a Closed Subscriber Group (CSG) base station where a select group of users identified by a CSG Identifier (ID) are allowed to access such base station.
- CSG Closed Subscriber Group
- ID CSG Identifier
- a CSG base station refers to a base station with restricted association accessible by members of a CSG (e.g., non-accessible by non-members of the CSG, ).
- a CSG base station can also be referred to as a closed base station.
- a CSG is a set of base stations that share a common access control list of UEs.
- a CSG base station can advertise a corresponding CSG ID (e.g., CSG identity, ...), which specifies the CSG corresponding to the CSG base station.
- Base station 102 can broadcast information to UE 116 and UE 122.
- the broadcasted information can include a CSG ID that identifies a CSG associated with base station 102.
- a CSG ID is a binary based identifier associated with a subscriber group.
- the CSG ID can be used to identify a subscriber group (e.g., CSG, ...) associated with a CSG base station, and can be utilized to support restricted association for a CSG base station.
- the CSG ID can uniquely identify the CSG associated with the CSG base station; however, the claimed subject matter is not so limited.
- the CSG ID associated with a base station typically is not based on an Internet Protocol (IP) address.
- IP Internet Protocol
- a base station can share a common CSG ID; however, the claimed subject matter is not so limited.
- the UE can use a list (e.g., whitelist, ...) stored by the UE to identify base stations that the UE is allowed to access.
- the list retained by the UE can be read only. Further, the read only list can be controlled by an operator. For example, as the network obtains information about which CSGs the UE is allowed to access, a network node (e.g., CSG list server, ...) can send a message to the UE instructing the UE to update the read only list.
- an application level update can be employed to update the read only list stored by the UE.
- the application level update can be managed by the operator using over-the-air (OTA) procedures or Open Mobile Alliance Device Management (OMA DM) procedures.
- OTA over-the-air
- OMA DM Open Mobile Alliance Device Management
- the read only list stored by the UE and controlled by the operator can be referred to as an operator CSG list.
- a problematic scenario can occur when the UE is removed from a CSG when implementing conventional approaches. For example, when the UE is removed from a CSG, and if the operator CSG list of the UE is not updated before the UE attempts to access a CSG cell (e.g., CSG base station, ...) from the CSG, then the UE can receive a reject message indicating that the UE lacks authorization for this CSG (e.g., the reject message can indicate cause #25 - not authorized for this CSG, ...)• Since the operator CSG list is read only, the UE can be unable to remove an entry corresponding to the CSG from the operator CSG list, while the UE also can be unable to access the CSG cell (e.g., the UE lacks permission to access the CSG cell, ).
- System 100 can mitigate detrimental impact associated with the foregoing problematic scenario oftentimes exhibited in connection with traditional techniques.
- a UE e.g., UE 116, UE 122, (7) in system 100 can avoid accessing a CSG cell (e.g., CSG base station, ...) for which it is not authorized. More particularly, the UE can store CSG entries that have been removed from a CSG subscription in the network, but continue to be included in the operator CSG list retained by the UE.
- the UE upon receiving a reject message that indicates that the UE lacks authorization for a CSG with a CSG ID included in the operator CSG list, the UE can store the CSG ID as a forbidden CSG ID of the UE in a set of forbidden CSG Identifiers (IDs) in response.
- IDs forbidden CSG Identifiers
- a CSG cell associated with a CSG with a corresponding CSG ID stored as a forbidden CSG ID in the set of forbidden CSG IDs can be considered unsuitable for access by the UE; hence, the UE can refrain from selecting to access such CSG cell while the corresponding CSG ID is included in the set of forbidden CSG IDs.
- System 200 that supports recovering from lack of synchronization between a network and a UE in a wireless communication environment.
- System 200 includes a UE 202 that can transmit and/or receive information, signals, data, instructions, commands, bits, symbols, and the like.
- system 200 can include any number of disparate UE(s), which can be substantially similar to UE 202.
- UE 202 can communicate with a base station 204 via the forward link and/or reverse link.
- Base station 204 can transmit and/or receive information, signals, data, instructions, commands, bits, symbols, and the like.
- any number of base stations similar to base station 204 can be included in system 200.
- base station 204 can be any type of base station (e.g., femto cell base station, pico cell base station, micro cell base station, macro cell base station, ).
- base station 204 can be a CSG base station, and thus, can operate in closed access mode.
- base station 204 can be associated with a CSG, and the CSG can be identified by a CSG ID.
- the CSG can be uniquely identified by the CSG ID (e.g., globally, ...), for example.
- the CSG can be uniquely identified by the CSG ID in an operator network.
- base station 204 can advertise the CSG ID.
- disparate base station(s) included in system 200 can be CSG base station(s), hybrid base station(s), and/or open base station(s).
- system 200 can employ a mixed deployment of base stations where some base stations are hybrid and other base stations are CSG or open.
- disparate base station(s) that are CSG base station(s) can be associated with respective CSG(s), and each of the respective CSG(s) can correspond to respective CSG ID(s).
- system 200 can include one or more network node(s) 206.
- UTRAN Universal Terrestrial Radio Access Network
- network node(s) 206 can include a mobile switching center (MSC) / visitor location register (VLR), a serving General Packet Radio Service (GPRS) support node (SGSN), a gateway GPRS support node (GGSN), a home subscriber server (HSS) / home location register (HLR), a policy and charging rule function (PCRF), and so forth.
- MSC mobile switching center
- GPRS General Packet Radio Service
- SGSN serving General Packet Radio Service
- GGSN gateway GPRS support node
- HSS home subscriber server
- HLR home location register
- PCRF policy and charging rule function
- E-UTRAN Evolved Universal Terrestrial Radio Access Network
- network node(s) 206 can include a packet data network gateway (PGW), a serving gateway (SGW), a mobility management entity (MME), a HSS/HLR, a PCRF, and the like.
- PGW packet data network gateway
- SGW serving gateway
- MME mobility management entity
- HSS/HLR HSS/HLR
- PCRF PCRF
- system 200 can include CSG provisioning elements such as, for instance, a CSG list server, a CSG administration server, etc. It is to be appreciated, however, that the claimed subject matter is not limited to the foregoing example architectures.
- UE 202 can include an operator CSG list 208.
- Operator CSG list 208 can be stored in UE 202, and can be under exclusive operator control.
- Operator CSG list 208 can include CSG IDs and/or associated Public Land Mobile Network (PLMN) identities of the CSGs to which a subscriber belongs.
- Operator CSG list 208 for example, can be stored in a Universal Subscriber Identity Module (USIM) (not shown) (or Subscriber Identity Module (SIM) (not shown)) of UE 202.
- USIM Universal Subscriber Identity Module
- SIM Subscriber Identity Module
- Operator CSG list 208 can be retained in any other type of memory (not shown) of UE 202.
- Memory can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
- nonvolatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable PROM (EEPROM), or flash memory.
- Volatile memory can include random access memory (RAM), which acts as external cache memory.
- RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
- SRAM synchronous RAM
- DRAM dynamic RAM
- SDRAM synchronous DRAM
- DDR SDRAM double data rate SDRAM
- ESDRAM enhanced SDRAM
- SLDRAM Synchlink DRAM
- DRRAM direct Rambus RAM
- Operator CSG list 208 can be read only by UE 202. Further, operator CSG list 208 can be provisioned using OMA DM procedures or OTA procedures. For instance, OTA procedures can be utilized to provision operator CSG list 208 if UE 202 has a Release 9 USIM, while OMA DM procedures can be employed to provision operator CSG list 208 if UE 202 has a pre-Release 9 USIM. By way of another illustration, OTA procedures can be used to provision operator CSG list 208 if UE 202 has a Release 8 USIM, while OMA DM procedures can be utilized to provision operator CSG list 208 if UE 202 has a pre-Release 8 USIM. It is to be appreciated, however, that the claimed subject matter is not limited to the foregoing examples.
- UE 202 can include a selection component 210 that can automatically select to access a CSG cell (e.g., corresponding to base station 204, ...) associated with a CSG with a corresponding CSG ID included in operator CSG list 208 of UE 202.
- Selection component 210 can implement manual or automatic selection (or reselection). When employing manual CSG selection, selection component 210 can search for available CSG cells (e.g., corresponding to base station 204, corresponding to disparate base station(s) (not shown), ...), irrespective of whether the CSG IDs corresponding to the available CSG cells are present or absent in operator CSG list 208.
- selection component 210 can detect a set of available CSG cells that are selectable (e.g., suitable or acceptable for access, ...), and can receive input that identifies a manually selected CSG cell chosen to be accessed by UE 202 from the set of available CSG cells.
- selection component 210 can obtain an advertised CSG ID sent by base station 204 that identifies the CSG corresponding to base station 204 (e.g., as well as advertised CSG ID(s) of one or more disparate base stations, ). Further, selection component 210 can obtain input pertaining to the manually selected CSG cell from the set of available CSG cells.
- the input can be manually yielded by a user of UE 202.
- selection component 210 can display a list of the available CSG cells in the set for selection (e.g., via a Graphical User Interface (GUI), ...), and can receive the input that identifies the manually selected CSG cell in response to the displayed list.
- GUI Graphical User Interface
- Selection component 210 can cause UE 202 to request to access base station 204 based upon either manual or automatic selection (or reselection). For example, UE 202 can send an attach request message, a detach request message, a tracking area update request message, a location area updating request message, a routing area update request message, or the like upon selecting to access a CSG cell (e.g., base station 204, ...) associated with a CSG with a corresponding CSG ID in operator CSG list 208, as effectuated by selection component 210. Further, UE 202 can receive an accept message or a reject message in response to the attach request message, detach request message, tracking area update request message, location area updating request message, routing area update request message, or the like sent thereby.
- one or more of network node(s) 206 can evaluate whether UE 202 is authorized to access such base station 204. At least one of the one or more of network node(s) 206 that evaluate whether UE 202 is authorized to access base station 204 can include an access control component 212.
- CSG subscription data can be permanently stored in a HSS/HLR, and retrieved by a MME, MSC/VLR, and/or SGSN for access control during an attach procedure, service request procedure, or tracking/location/routing area updating procedure.
- access control component 212 of a first one of network node(s) 206 can check that the CSG ID of the CSG cell corresponds to a CSG ID in the subscription data retrieved from a second one of network node(s) 206 (e.g., HSS/HLR, ...), and that an expiration time (if present) remains valid.
- access control component 212 of the first one of network node(s) 206 can send a reject message to UE 202 with an error code indicating that UE 202 is not authorized for this CSG (e.g., error code #25, ).
- access control component 212 of network node(s) 206 can perform access control based on the CSG ID advertised by the CSG cell (e.g., base station 204, ...) and the CSG subscription data of UE 202 stored in the network.
- UE 202 can further include a forbidden CSG management component 214 and a set of forbidden CSG IDs 216.
- UE 202 e.g., forbidden CSG management component 214, (7) receives a reject message (e.g., error code #25, ...) that indicates that UE 202 lacks authorization for the CSG associated with the CSG cell (e.g., base station 204, 7)
- forbidden CSG management component 214 can store the CSG ID corresponding thereto as a forbidden CSG ID of UE 202 in the set of forbidden CSG IDs 216 in response when the CSG ID is included in operator CSG list 208.
- forbidden CSG management component 214 can add and remove forbidden CSG IDs from the set of forbidden CSG IDs 216 as described in further detail herein.
- forbidden CSG management component 214 can store respective PLMN identities associated with CSG cells with the forbidden CSG IDs in the set of forbidden CSG IDs 216.
- the set of forbidden CSG IDs 216 can include forbidden CSG ID 1, ..., and forbidden CSG ID X, where X can be substantially any integer. It is to be appreciated that these CSG IDs can be in the form of a bit string or any other format. Moreover, although not shown, it is contemplated that the set of forbidden CSG IDs 216 can be an empty set at a given time (e.g., lacking any forbidden CSG IDs, ). It is also appreciated that the set of forbidden CSG IDs 216 can include one forbidden CSG ID at a particular time (e.g., forbidden CSG ID 1, ). According to an example, the set of forbidden CSG IDs 216 can be stored in a forbidden CSG list of UE 202. Following this example, the forbidden CSG list can be a read-write list retained by UE 202. However, it is to be appreciated that the claimed subject matter is not limited to the aforementioned example.
- Forbidden CSG management component 214 can temporarily store CSG ID(s) as forbidden CSG ID(s) in the set of forbidden CSG IDs 216, where the CSG ID(s) have been deleted from the CSG subscription data of UE 202 stored in the network, but have yet to be deleted from operator CSG list 208.
- the set of forbidden CSG IDs 216 can be leveraged by UE 202 to avoid accessing a CSG cell (e.g., base station 204, ...) for which it is not authorized, but which continues to be included in operator CSG list 208.
- the set of forbidden CSG IDs 216 can include CSG IDs of CSGs where UE 202 has received reject messages indicating that UE 202 lacks authorization for the CSGs, but which are included in operator CSG list 208. Since operator CSG list 208 is read only on UE 202, forbidden CSG IDs can be stored in the set of forbidden CSG IDs 216 until operator CSG list 208 is updated (e.g., until UE 202 performs a next application level update, ...), for example.
- the set of forbidden CSG IDs 216 can be temporarily retained (e.g., in a USIM of UE 202, in memory of UE 202, ...); further, the set of forbidden CSG IDs 216 can be deleted by forbidden CSG management component 214 when UE 202 performs an application level update of operator CSG list 208.
- forbidden CSG management component 214 can delete the set of forbidden CSG IDs 216 upon UE 202 being switched off, upon removal of a USIM from UE 202, periodically (e.g., 12 hours, 24 hours, 48 hours, substantially any period of time, ...), and so forth.
- forbidden CSG management component 214 can effectuate the following upon reception of the reject message sent by the network (e.g., yielded by access control component 212, ). If the CSG ID is included in operator CSG list 208, then forbidden CSG management component 214 of UE 202 can add the CSG ID to the set of forbidden CSG IDs 216 (e.g., the forbidden CSG list, ).
- forbidden CSG management component 214 can delete the set of forbidden CSG IDs 216 after UE 202 performs a next successful update of operator CSG list 208 using OTA or OMA DM procedures, for instance. Additionally or alternatively, forbidden CSG management component 214 can delete the set of forbidden CSG IDs 216 upon UE 202 being switched off, upon removal of a USIM of UE 202, periodically, or the like. Further, CSG cells belonging to a CSG ID stored in the set of forbidden CSG IDs 216 can be considered unsuitable for access by UE 202. Hence, the set of forbidden CSG IDs 216 can support the scenario where operator CSG list 208 of UE 202 is out of synch with CSG subscription data of UE 202 stored in the network.
- System 300 that identifies CSG cells available for access in a wireless communication environment.
- System 300 includes UE 202, base station 204, and network node(s) 206.
- UE 202 can include operator CSG list 208, which can be read only and controlled by an operator, and the set of forbidden CSG IDs 216.
- UE 202 can include selection component 210 and forbidden CSG management component 214.
- UE 202 can further include an allowed CSG list 302, which can be updateable by UE 202.
- an allowed CSG list 302 can be updatedable by UE 202.
- UE 202 can update allowed CSG list 302 if UE 202 is permitted access to a cell associated with a CSG ID that is not currently present in operator CSG list 208.
- UE 202 can have read and write permissions for allowed CSG list 302.
- allowed CSG list 302 can be stored on a USIM of UE 202, retained in memory of UE 202, and the like.
- an entry e.g., CSG ID, (7) is added to CSG subscription data of UE 202 stored in the network, but has yet to be added to operator CSG list 208 of UE 202
- the entry can be added to allowed CSG list 302 if UE 202 accessed the CSG before operator CSG list 208 has been updated.
- a CSG ID stored in allowed CSG list 302 occurs in operator CSG list 208 after operator CSG list 208 is updated (e.g., via application level update, ...), then UE 202 can remove the corresponding CSG ID in allowed CSG list 302. It is to be appreciated, however, that the claimed subject matter is not limited to the foregoing.
- forbidden CSG management component 214 can effectuate the following procedures upon reception of a reject message indicating that UE 202 lacks authorization for the CSG. If the CSG ID is included in allowed CSG list 302, then the entry can be deleted by forbidden CSG management component 214 from allowed CSG list 302. Accordingly, UE 202 can avoid accessing a CSG cell associated with the CSG ID.
- UE 202 can include a filter component 304 that can identify CSG cells that are suitable or unsuitable for access by UE 202.
- filter component 304 can recognize that CSG cells belonging to a CSG ID not included in operator CSG list 208 or allowed CSG list 302 or included in the set of forbidden CSG IDs 216 (e.g., included in a forbidden CSG list, ...) as being unsuitable for access by UE 202.
- selection component 210 can inhibit automatically selecting (or reselecting) CSG cells deemed unsuitable for access by filter component 304.
- selection component 210 can select a CSG cell that is unsuitable for access by UE 202 as determined by filter component 304.
- filter component 304 can consider a CSG cell (e.g., base station 204, ...) associated with a CSG with a corresponding CSG ID stored as a forbidden CSG ID in the set of forbidden CSG IDs 216 as unsuitable for access by UE 202. Further, filter component 304 can consider CSG cells with CSG IDs omitted from operator CSG list 208 and omitted from allowed CSG list 302 as unsuitable for access by UE 202. It is to be appreciated, however, that the claimed subject matter is not so limited.
- filter component 304 can remove CSG IDs from the set of forbidden CSG IDs 216 from a set of CSG IDs included in operator CSG list 208 to yield a remaining subset of CSG IDs.
- CSG cells associated with CSGs with corresponding CSG IDs included in the remaining subset of CSG IDs can be considered suitable for access by UE 202.
- Filter component 304 can remove the CSG IDs included in the set of forbidden CSG IDs 216 from the set of CSG IDs included in operator CSG list 208 regardless whether allowed CSG list 302 is employed by UE 202 (e.g., UE 202 can but need not include allowed CSG list 302, .
- System 400 includes UE 202, which can further include operator CSG list 208, selection component 210, forbidden CSG management component 214, the set of forbidden CSG IDs 216, and filter component 304.
- UE 202 can include a display component 402 that can render a list of available CSG IDs and associated PLMN identities.
- display component 402 can render the list of available CSG IDs and associated PLMN identities via a GUI.
- Operator CSG list 208 can include a list of allowed CSG IDs and associated PLMN identities.
- UE 202 can include an allowed CSG list (e.g., allowed CSG list 302 of Fig. 3, ...), which can also include a list of allowed CSG IDs and associated PLMN identities.
- an allowed CSG list e.g., allowed CSG list 302 of Fig. 3, .
- Selection component 210 can support automatic CSG selection or manual CSG selection. For example, for automatic CSG selection, a PLMN can be selected by selection component 210.
- selection component 210 for automatic CSG selection, can cause UE 202 to camp on a cell in the selected PLMN if the cell is either not a CSG cell or if it is a CSG cell with a CSG ID included in operator CSG list 208 (or included in the allowed CSG list of UE 202 if utilized).
- display component 402 can indicate a list of available CSG IDs and associated PLMN identities. Further, selection component 210 can obtain input specifying a selection from the list of available CSG IDs and associated PLMN identities. Moreover, selection component 210 can effectuate camping on a cell with the selected CSG ID and attempting to register with a PLMN corresponding to the associated PLMN identity based upon the input.
- filter component 304 can inhibit the CSG ID and associated PLMN identity from being included in a list of allowed CSG IDs and associated PLMN identities provided to an Access Stratum (AS) (e.g., by a Non-Access Stratum (NAS), ).
- AS Access Stratum
- NAS Non-Access Stratum
- filter component 304 can inhibit display component 402 from displaying the CSG ID and the associated PLMN identity as being in operator CSG list 208 stored by UE 202.
- a CSG ID stored in the set of forbidden CSG IDs 216 e.g., as controlled by forbidden CSG management component 214, ...) can be inhibited (e.g., by filter component 304, ...) from being displayed (e.g., by display component 402, ...) as included in operator CSG list 208.
- displaying e.g., by display component 402, (7) of the CSG ID as being associated with a CSG for which UE 202 is a member can be inhibited by filter component 304 when the CSG ID is stored as a forbidden CSG ID in the set of forbidden CSG IDs 216.
- the NAS can remove the CSG ID from the allowed CSG list if present; however, it is to be appreciated that the claimed subject matter is not so limited.
- filter component 304 can remove CSG ID(s) in the set of forbidden CSG IDs 216 from a set of CSG ID included in operator CSG list 208 to yield a subset of CSG IDs for display as being present in operator CSG list 208 via display component 402. Such removal of CSG ID(s) in the set of forbidden CSG IDs 216 can be effectuated to mitigate user confusion, and thus, enhance user experience.
- display component 402 indicates that UE 202 is a member of a CSG after UE 202 has been rejected at a CSG cell corresponding to a CSG ID in operator CSG list 208 (e.g., after receipt of a reject message indicating that UE 202 lacks authorization for the CSG, ...), then the user can be confused if manual selection is performed again and display component 402 continues to indicate that UE 202 is a member of the CSG corresponding to the CSG ID.
- forbidden CSG management component 214 can remove CSG ID(s) from the set of forbidden CSG IDs 216. According to an example, forbidden CSG management component 214 can erase the set of forbidden CSG IDs 216. Following this example, erasing of the set of forbidden CSG IDs 216 can be effectuated by forbidden CSG management component 214 upon switching UE 202 off, upon removal of a USIM from UE 202, periodically, upon operator CSG list 208 being updated, and so forth.
- forbidden CSG management component 214 can remove a CSG ID from the set of forbidden CSG IDs 216.
- Forbidden CSG management component 214 can remove a CSG ID from the set of forbidden CSG IDs 216 if a CSG cell with a forbidden CSG ID is manually selected (e.g., employing selection component 210, ...), UE 202 access the CSG cell, and UE 202 receives an accept message in response. Thus, UE 202 is accepted at the CSG cell.
- UE 202 can send an attach request message to a CSG cell corresponding to the CSG ID stored as a forbidden CSG ID in the set of forbidden CSG IDs 216 based upon a manual CSG selection effectuated by selection component 210.
- UE 202 can receive an attach accept message from the CSG cell in response to the attach request message.
- forbidden CSG management component 214 can remove the CSG ID from the set of forbidden CSG IDs in response to receipt of the attach accept message.
- UE 202 can send a request message to a CSG cell corresponding to the CSG ID stored as a forbidden CSG ID in the set of forbidden CSG IDs 216 based upon a manual CSG selection effectuated by selection component 210, where the request message can be a tracking area update request message, a location area updating request message, a routing area update request message, or the like. Further, UE 202 can receive an accept message from the CSG cell in response to the request message, where the accept message can be a tracking area update accept message, a location area updating accept message, a routing area update accept message, and so forth. Moreover, forbidden CSG management component 214 can remove the CSG ID from the set of forbidden CSG IDs 216 in response to receipt of the accept message. By way of yet another example, the CSG ID can be removed from the set of forbidden CSG IDs 216 when the CSG ID is removed from operator CSG list 208. It is to be appreciated, however, that the claimed subject matter is not limited to the foregoing examples.
- System 500 that provisions an operator CSG list (e.g., operator CSG list 208, ...) of a UE (e.g., UE 202, ...) in a wireless communication environment.
- System 500 includes UE 202 and a CSG list server 502.
- UE 202 can further include operator CSG list 208, selection component 210, forbidden CSG management component 214, the set of forbidden CSG IDs 216, and/or a list management component 504.
- CSG list server 502 can be employed to provision operator CSG list 208 of UE 202 using OMA DM procedures or OTA procedures. Moreover, CSG list server 502 can update operator CSG list 208 of UE 202. Thus, if a CSG ID is added or removed from CSG subscription data of UE 202 stored in the network, CSG list server 502 can add or remove the CSG ID from operator CSG list 208 of UE 202. [0089] It is to be appreciated, however, that UE 202 can be removed from a CSG before CSG list server 502 updates operator CSG list 208 to delete a CSG ID corresponding to the CSG.
- membership of UE 202 to the CSG can expire before CSG list server 502 updates operator CSG list 208 to delete the CSG ID corresponding to the CSG.
- the foregoing can result in UE 202 receiving a reject message that indicates that UE 202 lacks authorization for the CSG in response to selecting to access a CSG cell associated with the CSG with the corresponding CSG ID included in operator CSG list 208.
- forbidden CSG management component 214 can store the CSG ID as a forbidden CSG ID in the set of forbidden CSG IDs 216 in response to receipt of the reject message.
- list management component 504 can initiate updating of operator CSG list 208 when at least one forbidden CSG ID is stored (e.g., in the set of forbidden CSG IDs 216, ...) by UE 202.
- list management component 504 can cause CSG list server 502 to update operator CSG list 208 under such conditions.
- initiating of the update of operator CSG list 208 can be effectuated by list management component 504 at a time of a next access when at least one forbidden CSG ID is stored (e.g., in the set of forbidden CSG IDs 216, ...) by UE 202.
- list management component 504 can initiate the update of operator CSG list 208 after a predetermined length of time during which at least one forbidden CSG ID is stored (e.g., in the set of forbidden CSG IDs 216, ...) by UE 202.
- Fig. 6 illustrates an exemplary communication system 600 that enables deployment of access point base stations (e.g., femto cell base stations, ...) within a network environment.
- system 600 includes multiple femto cell base stations, which can also be referred to as access point base stations, Home Evolved Node B units (HeNBs), Home Node B unit (HNB), femto cells, or the like.
- the femto cell base stations (HeNBs 610) can each be installed in a corresponding small scale network environment, such as, for example, in one or more user residences 630, and can each be configured to serve associated, as well as alien, UE(s) 620.
- Each HeNB 610 is further coupled to the Internet 640 and a mobile operator core network 650 via a DSL router (not shown) or, alternatively, a cable modem (not shown).
- a DSL router not shown
- a cable modem not shown.
- the owner of HeNB 610 can subscribe to mobile service, such as, for example, 3G mobile service, offered through the mobile operator core network 650, and UE 620 can be capable to operate both in a macro cellular environment via a macro cell base station 660 and in a residential small scale network environment.
- HeNB 610 can be backward compatible with any existing UE 620.
- HeNBs 610 can include CSG HeNB(s), hybrid HeNB(s), and/or open HeNB(s).
- CSG Closed Subscriber Group
- System 700 depicts an example architecture model that can be utilized in conjunction with an HeNB 702 (e.g., HeNBs 610 of Fig. 6, base station 204 of Fig. 2, ). It is contemplated, however, that disparate architecture models are intended to fall within the scope of the hereto appended claims. For instance, although not shown, it is contemplated that differing architectures that support utilization of CSGs with a HNB, a macro cell base station, or any other type of base station is intended to fall within the scope of the claimed subject matter.
- HeNB 702 e.g., HeNBs 610 of Fig. 6, base station 204 of Fig. 2, . It is contemplated, however, that disparate architecture models are intended to fall within the scope of the hereto appended claims. For instance, although not shown, it is contemplated that differing architectures that support utilization of CSGs with a HNB, a macro cell base station, or any other type of base station is intended to fall within the scope of the claimed subject matter.
- HeNB 702 can be located on a user's premises; however, the claimed subject matter is not so limited. HeNB 702 can provide E- UTRAN eNB functions as well as functions to support HeNB authentication, HeNB registration, and HeNB configuration through Operation and Maintenance (OAM).
- HeNB 702 can communicate directly or indirectly with various nodes (e.g., network node(s) 206 of Fig. 2, ...) of a core network (e.g., Evolved Packet Core (EPC), ...) in system 700.
- the nodes of the core network can include a PGW 704, a SGW 706, a MME 708, and a HSS 710.
- system 700 can include more than one PGW 704, SGW 706, MME 708, and/or HSS 710.
- PGW 704 can interface with external Packet Data Network(s) (PDN(s)) such as, for instance, the Internet 712 and/or an IP multimedia subsystem (IMS) 714. Moreover, although not depicted, PGW 704 can additionally or alternatively interface with an Intranet or any disparate PDN(s). PGW 704, for example, can handle address allocation, policy enforcement, packet classification and routing, and so forth.
- PDN(s) Packet Data Network(s)
- IMS IP multimedia subsystem
- PGW 704 can additionally or alternatively interface with an Intranet or any disparate PDN(s).
- PGW 704 for example, can handle address allocation, policy enforcement, packet classification and routing, and so forth.
- SGW 706 is associated with a user plane and is an anchor point for mobility. SGW 706 points to a serving base station (e.g., HeNB 702, disparate HeNB, differing eNB, ...) of a user (e.g., employing a UE 716,
- SGW 706 can repoint to the differing base station. Further, SGW 706 can enable data to be routed to the appropriate base station (e.g., HeNB 702, ...) serving UE 716 at a given time.
- the appropriate base station e.g., HeNB 702, Certainly serving UE 716 at a given time.
- MME 708 is associated with a control plane.
- MME 708 can support control plane signaling for mobility, Quality of Service (QoS) initialization, user authentication, and the like.
- QoS Quality of Service
- HSS 710 can store various subscription information such as, for instance, phone numbers, profiles, and the like.
- System 700 includes various interfaces between nodes.
- an S6a interface can connect MME 708 and HSS 710 and an S5/S8 interface can connect SGW 706 and PGW 704.
- an Sl-U interface can connect HeNB 702 and SGW 706, an SI l interface can couple SGW 706 and MME 708, and an Sl-MME interface can connect HeNB 702 and MME 708.
- PGW 704 can connect to PDN(s) (e.g., Internet 712, IMS 714, ...) via respective SGi interfaces, and HeNB 702 and UE 716 can be coupled via an E-UTRA-Uu interface.
- MME 708 can be associated with an SlO interface to another MME (not shown).
- HSS 710 can also directly or indirectly connect to CSG provisioning network elements, namely a CSG administration server 718 and a CSG list server 720 (e.g., CSG list server 502 of Fig. 5, ).
- CSG administration server 718 can support CSG administration functions, which can be utilized to manage a list of subscribers for a CSG (e.g., access control list for the CSG, ).
- an owner of HeNB 702 can interact with CSG administration server 718 via an interface (e.g., GUI, website, ...) to add or remove a user from being included in a CSG associated with HeNB 702.
- CSG administration server 718 can update HSS 710 to adjust subscription information for the user as modified.
- CSG list server 720 provides UE CSG provisioning functionality utilized to manage a whitelist (WL) (e.g., operator CSG list 208 of Fig. 2, allowed CSG list 302 of Fig. 3, ...) for UE 716 (and/or any disparate UE(s) (not shown)).
- CSG list server 720 can inform UE 716 that it is a member of a particular group (e.g., particular CSG, ).
- HSS 710 can store subscription information corresponding to the update.
- updating the subscription information in HSS 710 can trigger a message to be transferred to CSG list server 720, which can cause CSG list server 720 to utilize an OMA-DM process or OTA process to downlink the modified subscription information to UE 716.
- CSG list server 720 can enable coordinating the subscription information retained by HSS 710 and UE 716 (e.g., stored in memory of UE 716, retained on a Subscriber Identity Module (SIM) or a USIM associated with UE 716, ).
- SIM Subscriber Identity Module
- USIM associated with UE 716
- the logical network protocol functions can include UE CSG provisioning functions, access control functions, mobility management functions, and CSG administration functions.
- UE CSG provisioning functions can manage the whitelist for UE 716.
- the whitelist is a list of CSG IDs; UE 716 is able to access CSG cells that have a CSG ID included in the whitelist.
- the whitelist can be stored in the network in order to perform access control and stored by UE 716 to enable selecting a cell to be accessed.
- the whitelist in the network can be permanently stored in HSS 710, and retrieved by MME 708 for access control during attach, detach, service request, and tracking area updating procedures.
- the whitelist at UE 716 can be stored on a USIM for such UE 716 or memory of UE 716.
- Access control functions can ensure that a UE has a valid subscription at a CSG where it performs an access.
- MME 708 e.g., access control component 212 of Fig. 2, ! can perform access control for UE 716 accessing the network through an CSG cell during attach, detach, service request, and tracking area updating procedures. Further, MME 708 can include a reject cause value in a N on- Access Stratum (NAS) signaling response upon recognizing that UE 716 is not allowed in the CSG for attach, service request, and/or tracking area updating procedures.
- NAS N on- Access Stratum
- mobility management functions can be used to keep track of a current location of UE 716.
- the location of UE 716 in idle state can be known by the network on a Tracking Area list granularity. Thus, when in idle state, UE 716 can be paged in all cells of the Tracking Area list received at a last Tracking Area Update.
- CSG administration functions can manage the list of subscribers for a CSG.
- the CSG administration function can be hosted by an operator or a third party. For instance, a single list can control the HeNBs for a CSG. Further, HeNBs advertising the same CSG ID can have a single list of subscribers.
- HSS 710 can permanently retain CSG subscription information.
- the CSG subscription information can be retrieved by MME 708 during an attach procedure or tracking area updating procedure as part of a subscription profile of UE 716.
- MME 708 can utilize the retrieved CSG subscription information to perform access control. For instance, MME 708 can perform access control since access control is a NAS level procedure, and MME 708 is the NAS endpoint in the core network. Further, MME 708 can obtain and store a copy of a whitelist for UE 716 (e.g., the whitelist can be retained as part of the user's subscription information, ). Moreover, MME 708 can know a CSG ID of a CSG cell where UE 716 is performing the access in order to effectuate access control.
- access control for CSGs can be implemented at an Access Stratum (AS).
- Access control at the AS can be implemented in a Radio Network Controller (RNC) function in HeNB 702 (or in a related function in an HeNB-Gateway (not shown)). It is to be appreciated, however, that the claimed subject matter is not so limited.
- RNC Radio Network Controller
- selecting to access a Closed Subscriber Group (CSG) cell associated with a CSG with a corresponding CSG Identifier (ID) included in an operator CSG list of a user equipment (UE) can be effectuated.
- the operator CSG list can be read only and controlled by an operator. For instance, an attach request message, a detach request message, a tracking area update request message, a location area updating request message, a routing area update request message, or the like can be sent upon selecting to access the CSG cell associated with the CSG with the corresponding CSG ID included in the operator CSG list.
- a reject message that indicates the UE lacks authorization for the CSG can be received.
- the CSG ID can be stored as a forbidden CSG ID of the UE in a set of forbidden CSG IDs in response to receipt of the reject message when the CSG ID is included in the operator CSG list. Further, the forbidden CSG ID can be stored in a forbidden CSG list of the UE. Moreover, a Public Land Mobile Network (PLMN) identity associated with the CSG cell can be stored with the forbidden CSG ID.
- PLMN Public Land Mobile Network
- the UE can be removed from the CSG before the operator CSG list is updated to delete the CSG ID.
- a membership of the UE for the CSG can expire before the operator CSG list is updated to delete the CSG ID.
- CSG cells can be recognized as being suitable or unsuitable for access by the UE as a function of at least the operator CSG list and the set of forbidden CSG IDs. For instance, a given CSG cell associated with a given CSG with a corresponding CSG ID stored as a given forbidden CSG ID in the set of forbidden CSG IDs can be considered unsuitable for access by the UE. According to another illustration, the set of forbidden CSG IDs can be removed from a set of CSG IDs included in the operator CSG list to yield a remaining subset of CSG IDs, wherein CSG cells associated with CSGs with corresponding CSG IDs included in the remaining subset of CSG IDs can be considered suitable for access by the UE.
- CSG cells with forbidden CSG IDs can be considered unsuitable for access by the UE.
- CSG cells with CSG IDs omitted from the operator CSG list and omitted from an allowed CSG list of the UE can be considered unsuitable for access by the UE, where the UE can have read and write permissions for the allowed CSG list.
- an update of the operator CSG list can be initiated when at least one forbidden CSG ID is stored (e.g., in the set of forbidden CSG IDs, ). For instance, the update of the operator CSG list can be initiated at a time of a next access when the at least one forbidden CSG ID is stored. In accordance with another illustration, the update of the operator CSG list can be initiated after a predetermined length of time during which the at least one forbidden CSG ID is stored. It is to be appreciated, however, that the claimed subject matter is not limited to the foregoing examples.
- the set of forbidden CSG IDs can be erased.
- the set of forbidden CSG IDs can be erased upon switching off the UE, upon removal of a Universal Subscriber Identity Module (USIM) from the UE, periodically, upon the operator CSG list being updated, and the like.
- the operator CSG list can be updated by a network (e.g., CSG list server, ...) via OMA DM procedures or OTA procedures.
- the CSG ID (or similarly any disparate CSG ID) can be removed from the set of forbidden CSG IDs.
- the CSG ID can be removed from the set of forbidden CSG IDs when implementing manual CSG selection. For example, an attach request message can be sent to the CSG cell corresponding to the CSG ID stored as the forbidden CSG ID based upon a manual CSG selection. Further, an attach accept message can be received from the CSG cell in response to the attach request message. Moreover, the CSG ID can be removed from the set of forbidden CSG IDs in response to receipt of the attach accept message.
- a request message can be sent to the CSG cell corresponding to the CSG ID stored as the forbidden CSG ID based upon a manual CSG selection, wherein the request message can be a tracking area update request message, a location area updating request message, and/or a routing area update request message.
- an accept message can be received from the CSG cell in response to the request message, wherein the accept message can be a tracking area update accept message, a location area updating accept message, and/or a routing area update accept message.
- the CSG ID can be removed from the set of forbidden CSG IDs in response to receipt of the accept message.
- the CSG ID can be removed from the set of forbidden CSG IDs when the CSG ID is removed from the operator CSG list. It is to be appreciated, however, that the claimed subject matter is not limited to the foregoing examples.
- inclusion of the CSG ID in a list of allowed CSG identities provided to an Access Stratum (AS) for cell selection can be inhibited in response to receipt of the reject message when the CSG ID is included in the operator CSG list, for example.
- display of the CSG ID as being in the operator CSG list can be inhibited for manual CSG selection mode upon the CSG ID being stored as the forbidden CSG ID.
- display of the CSG ID as being associated with a CSG for which the UE is a member can be inhibited when the CSG ID is stored as the forbidden CSG ID.
- a methodology 900 that facilitates identifying suitable cells for access in a wireless communication environment.
- a message indicating that a user equipment (UE) is not authorized for a Closed Subscriber Group (CSG) can be received.
- the message can be received in response to accessing a CSG cell associated with the CSG.
- whether a CSG Identifier (ID) corresponding to the CSG is present in an operator CSG list can be recognized. Further, the operator CSG list can be read only and controlled by an operator.
- ID CSG Identifier
- inclusion of the CSG ID in a list of allowed CSG IDs provided to an Access Stratum (AS) for cell selection can be inhibited when the CSG ID is present in the operator CSG list.
- the list of allowed CSG IDs can be provided to the AS by a Non-Access Stratum (NAS).
- NAS Non-Access Stratum
- the CSG ID can be inhibited from being included in the list of allowed CSG IDs for a period of time, until the UE is switched off, until a Universal Subscriber Identity Module (USIM) is removed from the UE, until the operator CSG list is updated, and so forth.
- USIM Universal Subscriber Identity Module
- a methodology 1000 that facilitates displaying entries in an operator CSG list for manual CSG selection mode in a wireless communication environment.
- a message indicating that a user equipment (UE) is not authorized for a Closed Subscriber Group (CSG) can be received.
- the message can be received in response to accessing a CSG cell associated with the CSG.
- whether a CSG Identifier (ID) corresponding to the CSG is present in an operator CSG list can be recognized.
- the operator CSG list can be read only and controlled by an operator.
- the UE can be inhibited from indicating that the CSG ID is in the operator CSG list stored in the UE for manual CSG selection mode.
- the UE can be inhibited from indicating (e.g., inhibiting display thereof, ...) that the CSG ID is in the operator CSG list stored in the UE for a period of time, until the UE is switched off, until a Universal Subscriber Identity Module (USIM) is removed from the UE, until the operator CSG list is updated, and so forth.
- indicating e.g., inhibiting display thereof, .
- inferences can be made regarding effectuating management of access control to CSGs in a wireless communication environment that supports multiple access modes.
- the term to "infer” or “inference” refers generally to the process of reasoning about or inferring states of the system, environment, and/or user from a set of observations as captured via events and/or data. Inference can be employed to identify a specific context or action, or can generate a probability distribution over states, for example. The inference can be probabilistic-that is, the computation of a probability distribution over states of interest based on a consideration of data and events.
- Inference can also refer to techniques employed for composing higher-level events from a set of events and/or data. Such inference results in the construction of new events or actions from a set of observed events and/or stored event data, whether or not the events are correlated in close temporal proximity, and whether the events and data come from one or several event and data sources.
- Fig. 11 is an illustration of a UE 1100 that manages access control to CSGs in a wireless communication system.
- UE 1100 comprises a receiver 1102 that receives a signal from, for instance, a receive antenna (not shown), and performs typical actions thereon (e.g., filters, amplifies, downconverts, etc.) the received signal and digitizes the conditioned signal to obtain samples.
- Receiver 1102 can be, for example, an MMSE receiver, and can comprise a demodulator 1104 that can demodulate received symbols and provide them to a processor 1106 for channel estimation.
- receiver 1102 can obtain an advertised CSG ID that identifies a CSG corresponding to a base station.
- Processor 1106 can be a processor dedicated to analyzing information received by receiver 1102 and/or generating information for transmission by a transmitter 1116, a processor that controls one or more components of UE 1100, and/or a processor that both analyzes information received by receiver 1102, generates information for transmission by transmitter 1116, and controls one or more components of UE 1100.
- UE 1100 can additionally comprise memory 1108 that is operatively coupled to processor 1106 and that can store data to be transmitted, received data, and any other suitable information related to performing the various actions and functions set forth herein.
- Memory 1108, for instance, can store protocols and/or algorithms associated with analyzing obtained CSG IDs.
- memory 1108 can store protocols and/or algorithms associated with selecting a base station (e.g., via manual or automatic CSG selection, ...) to access from an operator CSG list, detecting a reject message that indicates that UE 1100 lacks authorization for the CSG, and storing a CSG ID as a forbidden CSG of UE 1100 in a set of forbidden CSG IDs in response to receipt of the reject message when the CSG ID is included in the operator CSG list.
- Memory 1108 can also include an operator CSG list (e.g., operator CSG list 208 of Fig. 2, ...), which can be read only and controlled by an operator, and a set of forbidden CSG IDs (e.g., set of forbidden CSG IDs 216 of Fig. 2, ).
- memory 1108 can also include an allowed CSG list (e.g., allowed CSG list 302 of Fig. 3, ...), where UE 1100 can have read and write permissions to the allowed CSG list; yet, it is to be appreciated that the claimed subject matter is not so limited.
- the data store e.g., memory 1108, described herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
- nonvolatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable PROM (EEPROM), or flash memory.
- Volatile memory can include random access memory (RAM), which acts as external cache memory.
- RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
- SRAM synchronous RAM
- DRAM dynamic RAM
- SDRAM synchronous DRAM
- DDR SDRAM double data rate SDRAM
- ESDRAM enhanced SDRAM
- SLDRAM Synchlink DRAM
- DRRAM direct Rambus RAM
- the memory 1108 of the subject systems and methods is intended to comprise, without being limited to, these and any other suitable types of memory.
- Processor 1106 can be operatively coupled to a selection component 1110 and/or a forbidden CSG management component 1112.
- Selection component 1110 can be substantially similar to selection component 210 of Fig.
- forbidden CSG management component 1112 can be substantially similar to forbidden CSG management component 214 of Fig. 2.
- Selection component 1110 can select to access a CSG cell associated with a CSG with a corresponding CSG ID included in an operator CSG list (e.g., retained in memory 1108, ).
- UE 1100 e.g., receiver 1102, ...) can receive a reject message that indicates that UE 1100 lacks authorization for the CSG .
- forbidden CSG management component 1112 can store the CSG ID as a forbidden CSG ID in a set of forbidden CSG IDs in response to receipt of the reject message when the CSG ID is included in the operator CSG list.
- UE 1100 can further include a filter component (e.g., substantially similar to filter component 304 of Fig. 3, ...), a display component (e.g., substantially similar to display component 402 of Fig. 4, ...), and/or a list management component (e.g., substantially similar to list management component 504 of Fig. 5, ).
- UE 1100 still further comprises a modulator 1114 and a transmitter 1116 that transmits data, signals, etc. to a base station.
- selection component 1110, forbidden CSG management component 1112 and/or modulator 1114 can be part of processor 1106 or a number of processors (not shown).
- System 1200 is an illustration of a system 1200 that supports access in a wireless communication environment.
- System 1200 comprises a base station 1202 (e.g., access point, ...) with a receiver 1210 that receives signal(s) from one or more UEs 1204 through a plurality of receive antennas 1206, and a transmitter 1220 that transmits to the one or more UEs 1204 through a transmit antenna 1208.
- Receiver 1210 can receive information from receive antennas 1206 and is operatively associated with a demodulator 1212 that demodulates received information. Demodulated symbols are analyzed by a processor 1214 that can be similar to the processor described above with regard to Fig.
- Base station 1202 can further include a modulator 1218.
- Modulator 1218 can multiplex a frame for transmission by a transmitter 1220 through antennas 1208 to UE(s) 1204 in accordance with the aforementioned description. Although depicted as being separate from the processor 1214, it is to be appreciated that modulator 1218 can be part of processor 1214 or a number of processors (not shown).
- Fig. 13 shows an example wireless communication system 1300.
- the wireless communication system 1300 depicts one base station 1310 and one UE 1350 for sake of brevity.
- system 1300 can include more than one base station and/or more than one UE, wherein additional base stations and/or UEs can be substantially similar or different from example base station 1310 and UE 1350 described below.
- base station 1310 and/or UE 1350 can employ the systems (Figs. 1-7, 11-12 and 14-16) and/or methods (Figs. 8-10) described herein to facilitate wireless communication there between.
- traffic data for a number of data streams is provided from a data source 1312 to a transmit (TX) data processor 1314.
- TX data processor 1314 formats, codes, and interleaves the traffic data stream based on a particular coding scheme selected for that data stream to provide coded data.
- the coded data for each data stream can be multiplexed with pilot data using orthogonal frequency division multiplexing (OFDM) techniques. Additionally or alternatively, the pilot symbols can be frequency division multiplexed (FDM), time division multiplexed (TDM), or code division multiplexed (CDM).
- the pilot data is typically a known data pattern that is processed in a known manner and can be used at UE 1350 to estimate channel response.
- the multiplexed pilot and coded data for each data stream can be modulated (e.g., symbol mapped) based on a particular modulation scheme (e.g., binary phase-shift keying (BPSK), quadrature phase-shift keying (QPSK), M-phase-shift keying (M-PSK), M-quadrature amplitude modulation (M-QAM), etc.) selected for that data stream to provide modulation symbols.
- BPSK binary phase-shift keying
- QPSK quadrature phase-shift keying
- M-PSK M-phase-shift keying
- M-QAM M-quadrature amplitude modulation
- the data rate, coding, and modulation for each data stream can be determined by instructions performed or provided by processor 1330.
- the modulation symbols for the data streams can be provided to a TX MIMO processor 1320, which can further process the modulation symbols (e.g., for OFDM). TX MIMO processor 1320 then provides Nr modulation symbol streams to Nr transmitters (TMTR) 1322a through 13221 In various embodiments, TX MIMO processor 1320 applies beamforming weights to the symbols of the data streams and to the antenna from which the symbol is being transmitted.
- TX MIMO processor 1320 applies beamforming weights to the symbols of the data streams and to the antenna from which the symbol is being transmitted.
- Each transmitter 1322 receives and processes a respective symbol stream to provide one or more analog signals, and further conditions (e.g., amplifies, filters, and upconverts) the analog signals to provide a modulated signal suitable for transmission over the MIMO channel. Further, N ⁇ modulated signals from transmitters 1322a through 1322t are transmitted from Nr antennas 1324a through 1324t, respectively. [0013O] At UE 1350, the transmitted modulated signals are received by N R antennas 1352a through 1352r and the received signal from each antenna 1352 is provided to a respective receiver (RCVR) 1354a through 1354r. Each receiver 1354 conditions (e.g., filters, amplifies, and downconverts) a respective signal, digitizes the conditioned signal to provide samples, and further processes the samples to provide a corresponding "received" symbol stream.
- RCVR receiver
- An RX data processor 1360 can receive and process the N R received symbol streams from N R receivers 1354 based on a particular receiver processing technique to provide Nr "detected" symbol streams.
- RX data processor 1360 can demodulate, deinterleave, and decode each detected symbol stream to recover the traffic data for the data stream.
- the processing by RX data processor 1360 is complementary to that performed by TX MIMO processor 1320 and TX data processor 1314 at base station 1310.
- a processor 1370 can periodically determine which precoding matrix to utilize as discussed above. Further, processor 1370 can formulate a reverse link message comprising a matrix index portion and a rank value portion.
- the reverse link message can comprise various types of information regarding the communication link and/or the received data stream.
- the reverse link message can be processed by a TX data processor 1338, which also receives traffic data for a number of data streams from a data source 1336, modulated by a modulator 1380, conditioned by transmitters 1354a through 1354r, and transmitted back to base station 1310.
- the modulated signals from UE 1350 are received by antennas 1324, conditioned by receivers 1322, demodulated by a demodulator 1340, and processed by a RX data processor 1342 to extract the reverse link message transmitted by UE 1350.
- processor 1330 can process the extracted message to determine which precoding matrix to use for determining the beamforming weights.
- Processors 1330 and 1370 can direct (e.g., control, coordinate, manage, etc.) operation at base station 1310 and UE 1350, respectively. Respective processors 1330 and 1370 can be associated with memory 1332 and 1372 that store program codes and data. Processors 1330 and 1370 can also perform computations to derive frequency and impulse response estimates for the uplink and downlink, respectively.
- processors 1330 and 1370 can also perform computations to derive frequency and impulse response estimates for the uplink and downlink, respectively.
- the embodiments described herein can be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof.
- the processing units can be implemented within one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described herein, or a combination thereof.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGAs field programmable gate arrays
- processors controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described herein, or a combination thereof.
- a code segment can represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements.
- a code segment can be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc. can be passed, forwarded, or transmitted using any suitable means including memory sharing, message passing, token passing, network transmission, etc.
- the techniques described herein can be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein.
- the software codes can be stored in memory units and executed by processors.
- the memory unit can be implemented within the processor or external to the processor, in which case it can be communicatively coupled to the processor via various means as is known in the art.
- System 1400 that enables managing access control in a wireless communication environment.
- system 1400 can reside within a UE.
- system 1400 is represented as including functional blocks, which can be functional blocks that represent functions implemented by a processor, software, or combination thereof (e.g., firmware).
- System 1400 includes a logical grouping 1402 of electrical components that can act in conjunction.
- logical grouping 1402 can include an electrical component for selecting to access a Closed Subscriber Group (CSG) cell associated with a CSG with a corresponding CSG Identifier (ID) included in an operator CSG list of a user equipment (UE), the operator CSG list being read only and controlled by an operator 1404.
- CSG Closed Subscriber Group
- ID CSG Identifier
- logical grouping 1402 can comprise an electrical component for storing the CSG ID as a forbidden CSG ID in response to receipt of a reject message that indicates that the UE lacks authorization for the CSG when the CSG ID is included in the operator CSG list 1406.
- logical grouping 1402 can include an electrical component for removing at least the forbidden CSG ID from a set of forbidden CSG IDs 1408.
- Logical grouping 1402 can also optionally include an electrical component for identifying CSG cells suitable for access 1410.
- system 1400 can include a memory 1412 that retains instructions for executing functions associated with electrical components 1404, 1406, 1408, and 1410. While shown as being external to memory 1412, it is to be understood that one or more of electrical components 1404, 1406, 1408, and 1410 can exist within memory 1412.
- system 1500 that enables detecting CSG cells suitable for access in a wireless communication environment.
- system 1500 can reside within a UE.
- system 1500 is represented as including functional blocks, which can be functional blocks that represent functions implemented by a processor, software, or combination thereof (e.g., firmware).
- System 1500 includes a logical grouping 1502 of electrical components that can act in conjunction.
- logical grouping 1502 can include an electrical component for receiving a message indicating that a user equipment (UE) is not authorized for a Closed Subscriber Group (CSG) 1504.
- UE user equipment
- CSG Closed Subscriber Group
- logical grouping 1502 can include an electrical component for inhibiting inclusion of a CSG Identifier (ID) corresponding to the CSG in a list of allowed CSG IDs provided to an Access Stratum (AS) for cell selection when the CSG ID is present in an operator CSG list, the operator CSG list being read only and controlled by an operator 1506.
- Logical grouping 1502 can also optionally include an electrical component for identifying whether the CSG ID corresponding to the CSG is present in the operator CSG list 1508.
- system 1500 can include a memory 1510 that retains instructions for executing functions associated with electrical components 1504, 1506, and 1508. While shown as being external to memory 1510, it is to be understood that one or more of electrical components 1504, 1506, and 1508 can exist within memory 1510.
- system 1600 that enables displaying CSG IDs in connection with manual CSG selection mode in a wireless communication environment.
- system 1600 can reside within a UE.
- system 1600 is represented as including functional blocks, which can be functional blocks that represent functions implemented by a processor, software, or combination thereof (e.g., firmware).
- System 1600 includes a logical grouping 1602 of electrical components that can act in conjunction.
- logical grouping 1602 can include an electrical component for receiving a message indicating that a user equipment (UE) is not authorized for a Closed Subscriber Group (CSG) 1604.
- UE user equipment
- CSG Closed Subscriber Group
- logical grouping 1602 can include an electrical component for inhibiting the UE from indicating that a CSG Identifier (ID) corresponding to the CSG is in an operator CSG list stored in the UE for manual CSG selection mode, the operator CSG list being read only and controlled by an operator 1606. Additionally, logical grouping 1602 can optionally include an electrical component for identifying whether the CSG ID corresponding to the CSG is present in the operator CSG list 1608. Additionally, system 1600 can include a memory 1610 that retains instructions for executing functions associated with electrical components 1604, 1606, and 1608. While shown as being external to memory 1610, it is to be understood that one or more of electrical components 1604, 1606, and 1608 can exist within memory 1610.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- a general-purpose processor can be a microprocessor, but, in the alternative, the processor can be any conventional processor, controller, microcontroller, or state machine.
- a processor can also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. Additionally, at least one processor can comprise one or more modules operable to perform one or more of the steps and/or actions described above. [00143] Further, the steps and/or actions of a method or algorithm described in connection with the aspects disclosed herein can be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two.
- a software module can reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
- An exemplary storage medium can be coupled to the processor, such that the processor can read information from, and write information to, the storage medium.
- the storage medium can be integral to the processor.
- the processor and the storage medium can reside in an ASIC.
- the ASIC can reside in a user terminal.
- the processor and the storage medium can reside as discrete components in a user terminal.
- the steps and/or actions of a method or algorithm can reside as one or any combination or set of codes and/or instructions on a machine readable medium and/or computer readable medium, which can be incorporated into a computer program product.
- the functions described can be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions can be stored or transmitted as one or more instructions or code on a computer-readable medium.
- Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
- a storage medium can be any available media that can be accessed by a computer.
- such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
- any connection can be termed a computer-readable medium.
- a computer-readable medium includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs usually reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2011549342A JP5442773B2 (en) | 2009-02-09 | 2010-02-09 | Managing access control to closed subscriber groups |
ES10704681T ES2398719T3 (en) | 2009-02-09 | 2010-02-09 | Management of access control to closed groups of subscribers |
CN201080007127.6A CN102308601B (en) | 2009-02-09 | 2010-02-09 | Managing access control to closed subscriber groups |
KR1020117021158A KR101331503B1 (en) | 2009-02-09 | 2010-02-09 | Managing access control to closed subscriber groups |
EP10704681A EP2394449B1 (en) | 2009-02-09 | 2010-02-09 | Managing access control to closed subscriber groups |
Applications Claiming Priority (14)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15108609P | 2009-02-09 | 2009-02-09 | |
US61/151,086 | 2009-02-09 | ||
US22053609P | 2009-06-25 | 2009-06-25 | |
US61/220,536 | 2009-06-25 | ||
US22334209P | 2009-07-06 | 2009-07-06 | |
US61/223,342 | 2009-07-06 | ||
US22652009P | 2009-07-17 | 2009-07-17 | |
US61/226,520 | 2009-07-17 | ||
US24561609P | 2009-09-24 | 2009-09-24 | |
US61/245,616 | 2009-09-24 | ||
US25415009P | 2009-10-22 | 2009-10-22 | |
US61/254,150 | 2009-10-22 | ||
US12/701,319 US8571550B2 (en) | 2009-02-09 | 2010-02-05 | Managing access control to closed subscriber groups |
US12/701,319 | 2010-02-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010091430A1 true WO2010091430A1 (en) | 2010-08-12 |
Family
ID=42540834
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2010/023677 WO2010091430A1 (en) | 2009-02-09 | 2010-02-09 | Managing access control to closed subscriber groups |
Country Status (8)
Country | Link |
---|---|
US (1) | US8571550B2 (en) |
EP (1) | EP2394449B1 (en) |
JP (1) | JP5442773B2 (en) |
KR (1) | KR101331503B1 (en) |
CN (1) | CN102308601B (en) |
ES (1) | ES2398719T3 (en) |
TW (1) | TWI412289B (en) |
WO (1) | WO2010091430A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015523775A (en) * | 2012-05-22 | 2015-08-13 | 聯發科技股▲ふん▼有限公司Mediatek Inc. | Strengthening user equipment for service recovery in mobile communication networks |
EP4017153A3 (en) * | 2020-11-30 | 2022-11-16 | Nokia Technologies Oy | Private network tracking area collision avoidance |
Families Citing this family (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2466452A (en) * | 2008-12-18 | 2010-06-23 | Ubiquisys Ltd | A base station, for a cellular communication network |
JP5780574B2 (en) * | 2009-04-17 | 2015-09-16 | 日本電気株式会社 | COMMUNICATION CONTROL DEVICE, COMMUNICATION SYSTEM, CONTROL METHOD, AND PROGRAM |
US20110237250A1 (en) * | 2009-06-25 | 2011-09-29 | Qualcomm Incorporated | Management of allowed csg list and vplmn-autonomous csg roaming |
CN102461270B (en) * | 2009-06-26 | 2015-03-25 | 诺基亚公司 | Systems, methods, and apparatuses for facilitating handover to closed subscriber group cells |
US10477607B2 (en) * | 2009-06-29 | 2019-11-12 | Blackberry Limited | System and method for voice service in an evolved packet system |
CA2766689C (en) * | 2009-06-30 | 2018-07-03 | Ralf Keller | Handling of access capability information in a mobile network |
CN101990273B (en) * | 2009-08-04 | 2014-12-17 | 中兴通讯股份有限公司 | Method and system for home base station in hybrid access mode to acquire access mode of user equipment (UE) |
EP2897414B1 (en) * | 2010-04-02 | 2017-09-06 | Interdigital Patent Holdings, Inc. | Inhibition of allowed closed subscriber group list |
GB2481396A (en) * | 2010-06-21 | 2011-12-28 | Nec Casio Mobile Comm Ltd | Closed subscriber group (CSG) management |
US8280943B1 (en) * | 2010-07-07 | 2012-10-02 | T-Mobile Usa, Inc. | Managing service provider messaging |
US10204365B2 (en) | 2010-07-07 | 2019-02-12 | T-Mobile Usa, Inc. | Managing service provider service options |
US8619654B2 (en) | 2010-08-13 | 2013-12-31 | Intel Corporation | Base station selection method for heterogeneous overlay networks |
US8787337B2 (en) * | 2010-08-13 | 2014-07-22 | Intel Corporation | Techniques for managing mobility management signaling in a wireless network |
US20120064889A1 (en) * | 2010-09-14 | 2012-03-15 | Kundan Tiwari | Method of Handling Manual Closed Subscriber Group Selection and Related Communication Device |
US9826404B2 (en) | 2011-01-11 | 2017-11-21 | Qualcomm Incorporated | System and method for peer-to-peer authorization via non-access stratum procedures |
US20120202492A1 (en) * | 2011-02-03 | 2012-08-09 | Renesas Mobile Corporation | Method and apparatus for enabling identification of a rejecting network in connection with registration area updating |
CN102655638B (en) | 2011-03-02 | 2016-11-23 | 华为终端有限公司 | Cell access processing method and device, communication system |
US20130137423A1 (en) * | 2011-05-27 | 2013-05-30 | Qualcomm Incorporated | Allocating access to multiple radio access technologies via a multi-mode access point |
US9049646B2 (en) * | 2011-11-01 | 2015-06-02 | Blackberry Limited | Methods and apparatus for network searching |
EP2675220B1 (en) * | 2012-06-14 | 2018-08-08 | BlackBerry Limited | Method, device and computer readable medium for identifying channels prohibited for camping |
US9967814B2 (en) * | 2012-06-14 | 2018-05-08 | Blackberry Limited | Automatic tracking of mobile device camping failure to an access point |
ES2877822T3 (en) | 2012-09-26 | 2021-11-17 | Alcatel Lucent | Resilient packet data connectivity in a cellular network |
CN103781150A (en) * | 2012-10-17 | 2014-05-07 | 中国移动通信集团上海有限公司 | Base station access method and apparatus |
WO2014082219A1 (en) | 2012-11-28 | 2014-06-05 | 富士通株式会社 | Information configuration method, method for reporting connection establishment request, apparatus and system |
CN105009478B (en) | 2013-01-17 | 2018-05-25 | 英特尔Ip公司 | For extending the technology and system that discontinuously receive |
KR20150097748A (en) * | 2013-01-17 | 2015-08-26 | 후지쯔 가부시끼가이샤 | Information report method for device-to-device communication, user equipment, and base station |
KR101773158B1 (en) * | 2013-07-25 | 2017-08-30 | 후아웨이 테크놀러지 컴퍼니 리미티드 | Method for dynamically switching mobile network, subscription manager, and user equipment |
KR102158586B1 (en) * | 2013-10-03 | 2020-09-22 | 삼성전자주식회사 | A method and system for user equipment behavior in manual csg selection mode |
US9432928B1 (en) * | 2013-12-03 | 2016-08-30 | Sprint Spectrum L.P. | Base station implemented access control based on public land mobile network identity |
CN105264856B (en) * | 2013-12-25 | 2018-10-02 | 华为技术有限公司 | A kind of method and apparatus of load balancing |
US9516689B2 (en) | 2014-02-21 | 2016-12-06 | Apple Inc. | Mitigating no-service delays for LTE capable wireless devices without LTE access permission |
KR20150116043A (en) * | 2014-04-03 | 2015-10-15 | 한국전자통신연구원 | Method and apparatus for managing enterprise zone, and method and apparatus for controlling access to enterprise zone |
CN106465108A (en) * | 2014-05-20 | 2017-02-22 | 诺基亚技术有限公司 | Cellular network authentication control |
KR102510207B1 (en) * | 2015-04-17 | 2023-03-16 | 삼성전자주식회사 | Method for handling attach reject message with #14 cause at user equipment |
US10045312B2 (en) * | 2016-08-12 | 2018-08-07 | Nokia Technologies Oy | Method and apparatus for controlling high power transmission |
US10477608B2 (en) * | 2016-09-29 | 2019-11-12 | Futurewei Technologies, Inc. | System and method for network access using a relay |
FR3062017B1 (en) * | 2017-01-19 | 2019-12-20 | Transatel | METHOD FOR CHANGING CELLULAR COMMUNICATION NETWORK FOR AN OBJECT IMPLEMENTING A UICC CHIP CARD, NEEDING NO CHANGE OR REPROGRAMMING OF THE CHIP CARD |
KR20240068060A (en) * | 2017-08-09 | 2024-05-17 | 인터디지탈 패튼 홀딩스, 인크 | Access control in 5g nr |
WO2020036364A1 (en) * | 2018-08-13 | 2020-02-20 | 삼성전자 주식회사 | Method and apparatus for discovering and selecting private cellular network by terminal |
KR20200019067A (en) | 2018-08-13 | 2020-02-21 | 삼성전자주식회사 | Method and apparatus for discoverying and selecting private cellular network by a terminal |
CN111526546B (en) * | 2019-02-03 | 2023-02-03 | 中兴通讯股份有限公司 | Cell switching method and device, and user processing method and device |
US11632715B2 (en) * | 2020-06-08 | 2023-04-18 | Mediatek Inc. | Enhanced mechanism for accessing non-public network |
WO2022129409A1 (en) | 2020-12-18 | 2022-06-23 | Borealis Ag | Modification of polyethylene terpolymer |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6826414B1 (en) | 1996-07-10 | 2004-11-30 | Orange Personal Communciations Services Ltd. | Mobile communications system having a cellular communications network comprising a public network portion and a private network portion using a common radio interface protocol |
US20080194235A1 (en) * | 2007-02-09 | 2008-08-14 | Nokia Corporation | Forbidden tracking area optimization for private/home networks |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7181212B2 (en) | 2001-08-21 | 2007-02-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for location area updating in cellular communications |
DE10308012A1 (en) | 2003-02-25 | 2004-09-09 | Siemens Ag | Method for operating terminals of a mobile radio communication system |
US7483702B2 (en) * | 2004-10-20 | 2009-01-27 | Nokia Corporation | Cell reselection for improving network interconnection |
US20060123083A1 (en) * | 2004-12-03 | 2006-06-08 | Xerox Corporation | Adaptive spam message detector |
RU2409913C2 (en) | 2005-08-15 | 2011-01-20 | Нокиа Корпорейшн | Apparatus, method and computer software enabling addition of information on local zone in broadcast messages and managing radio access network blacklist |
US8072953B2 (en) | 2007-04-24 | 2011-12-06 | Interdigital Technology Corporation | Wireless communication method and apparatus for performing home Node-B identification and access restriction |
US8027681B2 (en) | 2007-06-05 | 2011-09-27 | Alcatel Lucent | Method and apparatus to allow hand-off from a macrocell to a femtocell |
US8265033B2 (en) | 2007-08-13 | 2012-09-11 | Telefonakatiebolaget Lm Ericsson (Publ) | Closed subscriber group cell handover |
US20090086672A1 (en) * | 2007-10-01 | 2009-04-02 | Qualcomm Incorporated | Equivalent home id for mobile communications |
BRPI0819635A8 (en) | 2007-11-26 | 2016-06-07 | Nokia Siemens Networks Oy | ACCESS TO THE LOCAL NETWORK USING PUBLIC CELL PHONES |
NZ585054A (en) | 2007-11-30 | 2013-08-30 | Ericsson Telefon Ab L M | Key management for secure communication |
US20090191857A1 (en) | 2008-01-30 | 2009-07-30 | Nokia Siemens Networks Oy | Universal subscriber identity module provisioning for machine-to-machine communications |
US20090270092A1 (en) * | 2008-04-28 | 2009-10-29 | Research In Motion Limited | Method for Assisting a Wireless Device to Find Closed Subscriber Group Cells |
CN101296451B (en) * | 2008-06-03 | 2012-02-29 | 中兴通讯股份有限公司 | Method for updating inside user group list of terminal |
CN101646253A (en) | 2008-08-07 | 2010-02-10 | 华为技术有限公司 | Paging method, network element, management network element and communication system |
US8666410B2 (en) * | 2008-09-22 | 2014-03-04 | Htc Corporation | Method of controlling cell selection for a wireless communication system and related device |
KR101249897B1 (en) * | 2008-09-26 | 2013-04-03 | 노키아 지멘스 네트웍스 오와이 | Method, apparatus and computer-readable storage medium for providing closed subscriber group access control |
WO2010039074A1 (en) * | 2008-10-02 | 2010-04-08 | Telefonaktiebolaget L M Ericsson (Publ) | Systems and methods for managing temporary users of a wireless communication network |
EP2744253A1 (en) | 2008-11-24 | 2014-06-18 | Telefonaktiebolaget L M Ericsson (publ) | Methods and systems for closed subscriber group roaming |
WO2010067221A1 (en) | 2008-12-09 | 2010-06-17 | Koninklijke Philips Electronics N.V. | Method and system for providing immersive effects |
US8924535B2 (en) | 2008-12-23 | 2014-12-30 | Qualcomm Incorporated | Maintaining closed subscriber group information for access control |
TWI580285B (en) | 2009-03-05 | 2017-04-21 | 內數位專利控股公司 | Method and apparatus for h(e)nb integrity verification and validation |
CN102369747A (en) | 2009-04-03 | 2012-03-07 | 松下电器产业株式会社 | Mobile communication method, mobile communication system, and corresponding apparatus |
US10893556B2 (en) | 2009-04-30 | 2021-01-12 | Samsung Electronics Co., Ltd | Method and apparatus for supporting local IP access in a femto cell of a wireless communication system |
US20110237250A1 (en) | 2009-06-25 | 2011-09-29 | Qualcomm Incorporated | Management of allowed csg list and vplmn-autonomous csg roaming |
-
2010
- 2010-02-05 US US12/701,319 patent/US8571550B2/en active Active
- 2010-02-08 TW TW099103839A patent/TWI412289B/en active
- 2010-02-09 KR KR1020117021158A patent/KR101331503B1/en active IP Right Grant
- 2010-02-09 JP JP2011549342A patent/JP5442773B2/en active Active
- 2010-02-09 EP EP10704681A patent/EP2394449B1/en active Active
- 2010-02-09 ES ES10704681T patent/ES2398719T3/en active Active
- 2010-02-09 CN CN201080007127.6A patent/CN102308601B/en active Active
- 2010-02-09 WO PCT/US2010/023677 patent/WO2010091430A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6826414B1 (en) | 1996-07-10 | 2004-11-30 | Orange Personal Communciations Services Ltd. | Mobile communications system having a cellular communications network comprising a public network portion and a private network portion using a common radio interface protocol |
US20080194235A1 (en) * | 2007-02-09 | 2008-08-14 | Nokia Corporation | Forbidden tracking area optimization for private/home networks |
Non-Patent Citations (3)
Title |
---|
3GPP TSG CT WG1: "LS on Introduction of the Operator CSG List", 3GPP DRAFT; S1-093207, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, no. Roma; 20090723, 23 July 2009 (2009-07-23), XP050355527 * |
3GPP TSG SA WG1: "Reply to LS on Introduction of the Operator CSG List", 3GPP DRAFT; C1-093287, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, no. Sevilla; 20090811, 11 August 2009 (2009-08-11), XP050350203 * |
QUALCOMM EUROPE ET AL, 12 October 2009, 3GPP DRAFT; C1-094799, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, XP050383516 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015523775A (en) * | 2012-05-22 | 2015-08-13 | 聯發科技股▲ふん▼有限公司Mediatek Inc. | Strengthening user equipment for service recovery in mobile communication networks |
EP4017153A3 (en) * | 2020-11-30 | 2022-11-16 | Nokia Technologies Oy | Private network tracking area collision avoidance |
US11956748B2 (en) | 2020-11-30 | 2024-04-09 | Nokia Technologies Oy | Private network tracking area collision avoidance |
Also Published As
Publication number | Publication date |
---|---|
US20100203865A1 (en) | 2010-08-12 |
TWI412289B (en) | 2013-10-11 |
ES2398719T3 (en) | 2013-03-21 |
EP2394449B1 (en) | 2012-12-05 |
EP2394449A1 (en) | 2011-12-14 |
KR20110126139A (en) | 2011-11-22 |
US8571550B2 (en) | 2013-10-29 |
JP5442773B2 (en) | 2014-03-12 |
JP2012517749A (en) | 2012-08-02 |
TW201110756A (en) | 2011-03-16 |
KR101331503B1 (en) | 2013-11-21 |
CN102308601A (en) | 2012-01-04 |
CN102308601B (en) | 2015-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2394449B1 (en) | Managing access control to closed subscriber groups | |
CA2741688C (en) | Support for multiple access modes for home base stations | |
CA2725459C (en) | Registration and access control in femto cell deployments | |
US20110237250A1 (en) | Management of allowed csg list and vplmn-autonomous csg roaming | |
JP2012517749A5 (en) | ||
AU2014201748B2 (en) | Support for multiple access modes for home base stations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201080007127.6 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10704681 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 5192/CHENP/2011 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011549342 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010704681 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 20117021158 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |